CVE-2022-50410
📋 TL;DR
This vulnerability in the Linux kernel's NFS server allows attackers to overflow send buffers by sending excessively large RPC Call messages. This affects systems running NFSv2 services, potentially leading to denial of service or kernel crashes. Any Linux system with NFSD enabled is vulnerable.
💻 Affected Systems
- Linux kernel NFS server (nfsd)
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to complete system crash and denial of service
Likely Case
NFS service disruption, potential denial of service affecting NFS clients
If Mitigated
Limited impact if NFS is not exposed or properly firewalled
🎯 Exploit Status
Exploitation requires network access to NFS port (2049). No authentication needed for the buffer overflow attack.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel stable releases containing the fix commits
Vendor Advisory: https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Reboot system. 3. Verify kernel version with 'uname -r'. 4. Restart nfsd service if needed.
🔧 Temporary Workarounds
Disable NFSv2
linuxDisable NFS version 2 protocol support
echo "options nfs nfs4_disable_idmapping=1" > /etc/modprobe.d/nfs.conf
systemctl restart nfs-server
Restrict NFS access
linuxUse firewall rules to limit NFS access to trusted networks
iptables -A INPUT -p tcp --dport 2049 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 2049 -j DROP
🧯 If You Can't Patch
- Disable NFS server entirely if not needed
- Implement strict network segmentation and firewall rules to limit NFS access
🔍 How to Verify
Check if Vulnerable:
Check if NFS server is running: 'systemctl status nfs-server' or 'ps aux | grep nfsd'. Check kernel version against patched releases.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated and test NFS functionality remains operational
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- NFS server crash logs
- Large RPC message size warnings
Network Indicators:
- Unusually large RPC packets to port 2049
- Multiple connection attempts with large payloads
SIEM Query:
source="kernel" AND ("panic" OR "oops") OR source="nfsd" AND "large" AND "RPC"
🔗 References
- https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905
- https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3
- https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244
- https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912
- https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607